Threat Models - Hardware Wallet Research #1

Threat Models - Hardware Wallet Research #1

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=MoGzPQhwW9s



Duration: 14:00
67,411 views
3,694


Why should we write our private key on a paper if the hardware wallet is so perfect?

research: https://wallet.fail

DISCLAIMER: These videos are not sponsored by Ledger. The security research shown here was done a while ago and since then the software and hardware was updated.

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Website: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

-=[ πŸ“„ P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#EmbeddedHardware #SecurityResearch




Other Videos By LiveOverflow


2019-02-11Games & Results: Gynvael's Winter GameDev Challenge 2018/19
2019-02-10APDU Communication between Device and Host - Hardware Wallet Research #6
2019-02-05Forensics with fls, Volatility and Timeline Explorer - ft. 13cubed
2019-02-01Identify Bootloader main() and find Button Press Handler - Hardware Wallet Research #5
2019-01-25Setup and Find Entry-point in ARM Firmware - Hardware Wallet Research #4
2019-01-21XS-Search abusing the Chrome XSS Auditor - filemanager 35c3ctf
2019-01-21[Live] Making-of a LiveOverflow CTF video write-up 2019 (35c3ctf)
2019-01-18Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3
2019-01-11Looking at the PCB & Chips - Hardware Wallet Research #2
2019-01-07Support LiveOverflow: Patreon & YouTube Membership
2019-01-04Threat Models - Hardware Wallet Research #1
2019-01-01Gynvael's Winter GameDev Challenge 2018/19
2018-12-28Hardware Wallet Hack: Ledger Nano S - f00dbabe
2018-12-25Jump Oriented Programming: Ethereum Smart Contract #2 - Real World CTF 2018
2018-12-21Ethereum Smart Contract Hacking - Real World CTF 2018
2018-12-14Going to Chinese Hacking Competition - Real World CTF Finals
2018-12-07OsmocomBB: Open Source GSM Implementation - Motorola Calypso Chip
2018-11-30Nintendo Switch (NVIDIA Tegra X1) - BootROM Vulnerability
2018-11-23End-to-End Encryption in the Browser Impossible? - ProtonMail
2018-11-16Identifying Good Research to actually Learn Something - Cross-site Scripting
2018-11-09Student Finds Hidden Devices in the College Library - Are they nefarious?



Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
hardware wallet
crypto
cryptocurrency
crypto currency
bitcoin
ethereum
tokens
wallet
paper wallet
backups
ledger
bitfi
trezor
keepkey
security
reverse engineering
architecture
transactions
arm
threat models
threat modeling